Количество 9
Количество 9
CVE-2019-12209
Yubico pam-u2f 1.0.7 attempts parsing of the configured authfile (default $HOME/.config/Yubico/u2f_keys) as root (unless openasuser was enabled), and does not properly verify that the path lacks symlinks pointing to other files on the system owned by root. If the debug option is enabled in the PAM configuration, part of the file contents of a symlink target will be logged, possibly revealing sensitive information.
CVE-2019-12209
Yubico pam-u2f 1.0.7 attempts parsing of the configured authfile (default $HOME/.config/Yubico/u2f_keys) as root (unless openasuser was enabled), and does not properly verify that the path lacks symlinks pointing to other files on the system owned by root. If the debug option is enabled in the PAM configuration, part of the file contents of a symlink target will be logged, possibly revealing sensitive information.
CVE-2019-12209
Yubico pam-u2f 1.0.7 attempts parsing of the configured authfile (defa ...
GHSA-cf2r-5chq-jmm8
Yubico pam-u2f 1.0.7 attempts parsing of the configured authfile (default $HOME/.config/Yubico/u2f_keys) as root (unless openasuser was enabled), and does not properly verify that the path lacks symlinks pointing to other files on the system owned by root. If the debug option is enabled in the PAM configuration, part of the file contents of a symlink target will be logged, possibly revealing sensitive information.
BDU:2019-02526
Уязвимость файла аутентификации $HOME/.config/Yubico/u2f_keys PAM-модуля Yubico pam-u2f, позволяющая нарушителю раскрыть защищаемую информацию
openSUSE-SU-2019:1725-1
Security update for libu2f-host, pam_u2f
openSUSE-SU-2019:1708-1
Security update for libu2f-host, pam_u2f
SUSE-SU-2019:1750-1
Security update for libu2f-host, pam_u2f
SUSE-SU-2019:1749-1
Security update for libu2f-host
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2019-12209 Yubico pam-u2f 1.0.7 attempts parsing of the configured authfile (default $HOME/.config/Yubico/u2f_keys) as root (unless openasuser was enabled), and does not properly verify that the path lacks symlinks pointing to other files on the system owned by root. If the debug option is enabled in the PAM configuration, part of the file contents of a symlink target will be logged, possibly revealing sensitive information. | CVSS3: 7.5 | 1% Низкий | больше 6 лет назад | |
CVE-2019-12209 Yubico pam-u2f 1.0.7 attempts parsing of the configured authfile (default $HOME/.config/Yubico/u2f_keys) as root (unless openasuser was enabled), and does not properly verify that the path lacks symlinks pointing to other files on the system owned by root. If the debug option is enabled in the PAM configuration, part of the file contents of a symlink target will be logged, possibly revealing sensitive information. | CVSS3: 7.5 | 1% Низкий | больше 6 лет назад | |
CVE-2019-12209 Yubico pam-u2f 1.0.7 attempts parsing of the configured authfile (defa ... | CVSS3: 7.5 | 1% Низкий | больше 6 лет назад | |
GHSA-cf2r-5chq-jmm8 Yubico pam-u2f 1.0.7 attempts parsing of the configured authfile (default $HOME/.config/Yubico/u2f_keys) as root (unless openasuser was enabled), and does not properly verify that the path lacks symlinks pointing to other files on the system owned by root. If the debug option is enabled in the PAM configuration, part of the file contents of a symlink target will be logged, possibly revealing sensitive information. | CVSS3: 7.5 | 1% Низкий | больше 3 лет назад | |
BDU:2019-02526 Уязвимость файла аутентификации $HOME/.config/Yubico/u2f_keys PAM-модуля Yubico pam-u2f, позволяющая нарушителю раскрыть защищаемую информацию | CVSS3: 7.5 | 1% Низкий | больше 6 лет назад | |
openSUSE-SU-2019:1725-1 Security update for libu2f-host, pam_u2f | больше 6 лет назад | |||
openSUSE-SU-2019:1708-1 Security update for libu2f-host, pam_u2f | больше 6 лет назад | |||
SUSE-SU-2019:1750-1 Security update for libu2f-host, pam_u2f | больше 6 лет назад | |||
SUSE-SU-2019:1749-1 Security update for libu2f-host | больше 6 лет назад |
Уязвимостей на страницу